Vulnerabilities > Debian
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2024-01-31 | CVE-2024-1086 | Use After Free vulnerability in multiple products A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error which resembles NF_ACCEPT. We recommend upgrading past commit f342de4e2f33e0e39165d8639387aa6c19dff660. | 7.8 |
2024-01-29 | CVE-2023-46838 | NULL Pointer Dereference vulnerability in multiple products Transmit requests in Xen's virtual network protocol can consist of multiple parts. | 7.5 |
2024-01-23 | CVE-2024-0741 | Out-of-bounds Write vulnerability in multiple products An out of bounds write in ANGLE could have allowed an attacker to corrupt memory leading to a potentially exploitable crash. | 6.5 |
2024-01-23 | CVE-2024-0742 | It was possible for certain browser prompts and dialogs to be activated or dismissed unintentionally by the user due to an incorrect timestamp used to prevent input after page load. | 4.3 |
2024-01-23 | CVE-2024-0746 | A Linux user opening the print preview dialog could have caused the browser to crash. | 6.5 |
2024-01-23 | CVE-2024-0747 | When a parent page loaded a child in an iframe with `unsafe-inline`, the parent Content Security Policy could have overridden the child Content Security Policy. | 6.5 |
2024-01-23 | CVE-2024-0749 | Origin Validation Error vulnerability in multiple products A phishing site could have repurposed an `about:` dialog to show phishing content with an incorrect origin in the address bar. | 4.3 |
2024-01-23 | CVE-2024-0750 | A bug in popup notifications delay calculation could have made it possible for an attacker to trick a user into granting permissions. | 8.8 |
2024-01-23 | CVE-2024-0751 | Improper Privilege Management vulnerability in multiple products A malicious devtools extension could have been used to escalate privileges. | 8.8 |
2024-01-23 | CVE-2024-0753 | In specific HSTS configurations an attacker could have bypassed HSTS on a subdomain. | 6.5 |